Adversaries Are Doing Stranger Things

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ก.ย. 2024
  • Cybersecurity adversaries are continuously developing innovative methods to circumvent traditional security controls. This presentation dives into these unconventional techniques and highlights how they bypass established defense mechanisms. Based on real-world case studies, we'll examine many of these abnormal approaches, including non-standard tools, novel C2 methods, and developer tools used to subvert security controls. Understanding the diversity in adversary sophistication is crucial. This presentation aims to equip cyber professionals with the knowledge to identify and counteract these unconventional tactics, contributing to a more robust and responsive security posture.
    To check out more from the Offensive Operations curriculum and discover additional free resources, please visit: www.sans.org/o...
    #SANSTraining #OffensiveSecurity #OffensiveOperations

ความคิดเห็น •